Sciweavers

1081 search results - page 114 / 217
» Working with the LR Degrees
Sort
View
105
Voted
INFOCOM
2008
IEEE
15 years 7 months ago
Temporal Delay Tomography
Abstract—Multicast-based network tomography enables inference of average loss rates and delay distributions of internal network links from end-to-end measurements of multicast pr...
Vijay Arya, Nick G. Duffield, Darryl Veitch
108
Voted
INFOCOM
2008
IEEE
15 years 7 months ago
On the Construction of a Maximum-Lifetime Data Gathering Tree in Sensor Networks: NP-Completeness and Approximation Algorithm
Abstract—Energy efficiency is critical for wireless sensor networks. The data gathering process must be carefully designed to conserve energy and extend the network lifetime. Fo...
Yan Wu, Sonia Fahmy, Ness B. Shroff
TOOLS
2008
IEEE
15 years 7 months ago
Ownership, Uniqueness, and Immutability
Programming in an object-oriented language demands a fine balance between high degrees of expressiveness and control. At one level, we need to permit objects to interact freely t...
Johan Östlund, Tobias Wrigstad, Dave Clarke, ...
115
Voted
AGILEDC
2007
IEEE
15 years 7 months ago
On the Sustained Use of a Test-Driven Development Practice at IBM
Test-Driven Development (TDD) is an agile practice that is widely accepted and advocated by most agile methods and methodologists. In this paper, we report on a post hoc analysis ...
Julio Cesar Sanchez, Laurie A. Williams, E. Michae...
AINA
2007
IEEE
15 years 7 months ago
Intrusion Detection for Encrypted Web Accesses
As various services are provided as web applications, attacks against web applications constitute a serious problem. Intrusion Detection Systems (IDSes) are one solution, however,...
Akira Yamada, Yutaka Miyake, Keisuke Takemori, Ahr...